Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings” Please respond to the following:
- Determine one (1) situation that can cause a breach of network security. Provide two (2) examples to demonstrate the manner in which GPOs can be used to bolster network security to prevent the situation from occurring.
- Choose at least two (2) Computer Configuration node security settings and, for each, specify a scenario whereby configuring the setting would provide security benefits. In each of your scenario descriptions, compare a pre-security configuration scenario with a post-security configuration scenario to demonstrate the potential security improvements.